Comment: This item will be picked, packed and shipped by Amazon and is eligible for free delivery within the UK

Fulfilment by Amazon (FBA) is a service Amazon offers sellers that lets them store their products in Amazon's warehouses, and Amazon directly does the picking, packing, shipping and customer service on these items. Something Amazon hopes you'll especially enjoy: FBA items are eligible for and for Amazon Prime just as if they were Amazon items.

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

Product description

Amazon Review

Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.

The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.

Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient
--This text refers to an out of print or unavailable edition of this title.

From the Back Cover

"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." Bill Machrone, PC Magazine

"Reading this book is better than hiring those Sneakers guys to break into your network to tell you where the open doors are, and it doesn't cost nearly as much." Professional Certification magazine

"A great practical guide for administrators and an eminently readable expose on hacking that should smooth the way for sensible executive policies to protect corporate networks." Cameron Sturdevant, eWeek

"Will tell you more about what hackers have done and can and can't do than anything else I have seen....Chock full of tips on countermeasures and just plain usability tricks. Recommended." Jerry Pournelle, BYTE Magazine

"For almost any computer book, you can find a clone. But not this one.... A one-of-a-kind study of the art of breaking in." UNIX Review

Top customer reviews

There was a problem filtering reviews right now. Please try again later.

Having read this book it made me realise how easy it can be to leave holes behind. If you are thinking of becoming a network security administrator or a security consultant this book will definitely enhance your knowledge.The good thing about this book is that not only does it tell you how to exploit a security hole but also how to close it to avoid the intrusion in the first place. Get this book, it is well worth it

This book is a must for system administrators. I've been studying Unix security for many years, and the authors of this book know what they are talking about! It is easy reading, but goes down to sufficient level of detail to give you a complete understanding (or points you to the appropriate URL)It contains detail on scanning and securing: * Windows 95/98 * Windows NT * Novel Netware * UNIX * Dial Up lines * Routers * Firewalls * Web ServersThe only complaint I have about the book is that it does not come with a CD containing all the tools referenced. Yes, they are available from the book's FTP site, but I distrust any programs downloaded from the Net, and the book does not warn the reader about how to treat downloaded programs.Nevertheless, I cannot recommend this book highly enough.

If your a newbie in the world of computer security and fed up with trying to find answers on the internet then this is a definate book to read. It introduces the aspects concerned with all kinds of security and will improve your understanding of the subject.

Despite this edition being fairly old now, I still refer to it quite frequently. If you're already working in a security related field, you will most likely be aware of the majority of the tools the author discusses, but the organized approach to the chapters makes it worthwhile reading when you're doing a security audit anyway - to make sure you don't miss anything. Also, you may still pick up a trick or two.

This book make a fascinating read. It is written almost as a hacker's notebook, detailing how a system is targetted and then attacked. Fortunately the book didn't scare me, instead it did reassure me as I was aware of most of the techniques discussed. But the value lays in the way that the book is a summary of all those thousands of web pages discussing vulnerabilities and hacking tools. The book is less than 500 pages yet still covers the pre-amble to an attack and the major weakness (and how to exploit them) of Win 9x, NT 4, Novell and Unix along with other sections on Windows 2000, network devices, firewalls, web servers etc. Some knowledge of Unix and NT services and TCP/IP is assumemed, but it makes a refreshing change to have a book that isn't 1000 pages of padding taken up by TCP/IP and the history of the Internet (again!).

Top notch book, best one i've reviewed on the subject and recommend it for all those network administrators or weiry household users. I was amazed to have discovered that this book provides in detail how hackers hack, techniques,tools,ect and HOW YOU CAN FIGHT BACK!!! makin sure your machine is behind lock 'n key. EXCELLENT